A Secure Computing Platform for Building Automation Using Microkernel-based Operating Systems

v CHAPTER 1: INTRODUCTION 1 1.1 Building Automation Systems 1 1.2 Safety and Security Challenges for BAS 2 1.3 Existing BAS Security Solutions 4

[1]  Gernot Heiser,et al.  From L3 to seL4 what have we learnt in 20 years of L4 microkernels? , 2013, SOSP.

[2]  Gernot Heiser,et al.  Correct, fast, maintainable: choose any three! , 2012, APSys.

[3]  Elaine J. Weyuker,et al.  The distribution of faults in a large industrial software system , 2002, ISSTA '02.

[4]  Gernot Heiser,et al.  The role of virtualization in embedded systems , 2008, IIES '08.

[5]  Kari Burman,et al.  Net Zero Energy Military Installations: A Guide to Assessment and Planning , 2010 .

[6]  Gregory D. Koblentz Biosecurity Reconsidered: Calibrating Biological Threats and Responses , 2010, International Security.

[7]  Wolfgang Granzer,et al.  Security in Building Automation Systems , 2010, IEEE Transactions on Industrial Electronics.

[8]  Udo Steinberg,et al.  NOVA: a microhypervisor-based secure virtualization architecture , 2010, EuroSys '10.

[9]  Adam Lackorzynski,et al.  Demo Abstract: Timing Aware Hardware Virtualization on the L4Re Microkernel Systems , 2016, 2016 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS).

[10]  Carl Staelin,et al.  lmbench: Portable Tools for Performance Analysis , 1996, USENIX Annual Technical Conference.

[11]  Peter Palensky,et al.  Software security requirements in building automation , 2016, Sicherheit.

[12]  Mordechai Guri,et al.  HVACKer: Bridging the Air-Gap by Attacking the Air Conditioning System , 2017, ArXiv.

[13]  D. T. Hitchings Laboratory space pressurization control systems , 1994 .

[14]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[15]  Irfan Habib,et al.  Virtualization with KVM , 2008 .

[16]  Gerwin Klein,et al.  capDL: a language for describing capability-based systems , 2010, APSys '10.

[17]  John Buford,et al.  Phone virtualization using a microkernel hypervisor , 2009, 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA).

[18]  Jochen Liedtke,et al.  The performance of μ-kernel-based systems , 1997, SOSP.

[19]  Gernot Heiser,et al.  Camkes: a Component Model for Secure Microkernel-based Emebedded Systems , 2007 .

[20]  Igor Nai Fovino,et al.  A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems , 2011, IEEE Transactions on Industrial Informatics.

[21]  Michael G. Apte,et al.  Indoor carbon dioxide concentrations and sick building syndrome symptoms in the BASE study revisited: Analyses of the 100 building dataset , 2002 .

[22]  Jesús María Molina Terriza,et al.  LEARN HOW TO CONTROL EVERY ROOM AT A LUXURY HOTEL REMOTELY: THE DANGERS OF INSECURE HOME AUTOMATION DEPLOYMENT , 2014 .

[23]  Richard Habeeb,et al.  Improving the Security of Building Automation Systems Through an seL4-based Communication Framework , 2018 .

[24]  John Rushby A Trusted Computing Base for Embedded Systems , 1984 .

[25]  Trent Jaeger Operating System Security , 2008, Operating System Security.

[26]  Bill McCarty,et al.  Selinux: NSA's Open Source Security Enhanced Linux , 2004 .

[27]  Zhong Shao,et al.  CertiKOS: An Extensible Architecture for Building Certified Concurrent OS Kernels , 2016, OSDI.

[28]  Per Brinch Hansen,et al.  The nucleus of a multiprogramming system , 1970, CACM.

[29]  Kevin Elphinstone,et al.  Experience report: seL4: formally verifying a high-performance microkernel , 2009, ICFP.

[30]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[31]  Gernot Heiser,et al.  The Jury Is In: Monolithic OS Design Is Flawed: Microkernel-based Designs Improve Security , 2018, APSys.

[32]  Timothy Grance,et al.  Guide to Supervisory Control and Data Acquisition (SCADA) and Other Industrial Control System Security , 2006 .

[33]  Gernot Heiser,et al.  The OKL4 microvisor: convergence point of microkernels and hypervisors , 2010, APSys '10.

[34]  Asif Iqbal,et al.  An Overview of Microkernel , Hypervisor and Microvisor Virtualization Approaches for Embedded Systems , 2010 .

[35]  Ole Agesen,et al.  A comparison of software and hardware techniques for x86 virtualization , 2006, ASPLOS XII.

[36]  Gerwin Klein,et al.  Towards verified virtual memory in L4 , 2004 .

[37]  Hermann Merz,et al.  Building Automation: Communication systems with EIB/KNX, LON and BACnet , 2009 .

[38]  Herbert Bos,et al.  Can we make operating systems reliable and secure? , 2006, Computer.

[39]  Dan Hildebrand,et al.  An Architectural Overview of QNX , 1992, USENIX Workshop on Microkernels and Other Kernel Architectures.

[40]  Dragan Peraković,et al.  Analysis of the IoT impact on volume of DDoS attacks , 2015 .

[41]  Adam Lackorzynski,et al.  L 4 Linux Porting Optimizations , 2004 .

[42]  W. Granzer,et al.  Security in networked building automation systems , 2006, 2006 IEEE International Workshop on Factory Communication Systems.

[43]  Stefan Axelsson,et al.  The base-rate fallacy and its implications for the difficulty of intrusion detection , 1999, CCS '99.

[44]  Michael Roitzsch,et al.  Ten Years of Research on L 4-Based Real-Time Systems , 2006 .

[45]  Michael Norrish,et al.  seL4: formal verification of an OS kernel , 2009, SOSP '09.

[46]  David G. Holmberg,et al.  BACnet wide area network security threat assessment , 2011 .

[47]  Sang-Bum Suh,et al.  Xen on ARM: System Virtualization Using Xen Hypervisor for ARM-Based Secure Mobile Phones , 2008, 2008 5th IEEE Consumer Communications and Networking Conference.

[48]  Dietmar Loy,et al.  Open control networks: LonWorks/EIA 709 technology , 2001 .

[49]  Scott Shenker,et al.  Overcoming the Internet impasse through virtualization , 2005, Computer.

[50]  Xiaolong Wang,et al.  Enhanced Security of Building Automation Systems Through Microkernel-Based Controller Platforms , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW).

[51]  Yuval Elovici,et al.  Securing Android-Powered Mobile Devices Using SELinux , 2010, IEEE Security & Privacy.

[52]  Jochen Liedtke,et al.  On micro-kernel construction , 1995, SOSP.

[53]  James D. Mooney Bringing Portability to the Software Process , 2000 .

[54]  Joseph G. Allen,et al.  Associations of Cognitive Function Scores with Carbon Dioxide, Ventilation, and Volatile Organic Compound Exposures in Office Workers: A Controlled Exposure Study of Green and Conventional Office Environments , 2015, Environmental health perspectives.

[55]  Xiaolong Wang,et al.  Secure RTOS Architecture for Building Automation , 2015, CPS-SPC@CCS.

[56]  Kim Zetter,et al.  Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon , 2014 .

[57]  Ralph Langner To Kill a Centrifuge A Technical Analysis of What Stuxnet ’ s Creators Tried to Achieve , 2013 .

[58]  Gernot Heiser,et al.  Hardware-supported virtualization on ARM , 2011, APSys.

[59]  Stamatis Karnouskos,et al.  Stuxnet worm impact on industrial cyber-physical system security , 2011, IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society.

[60]  Wolfgang Granzer,et al.  Securing IP backbones in building automation networks , 2009, 2009 7th IEEE International Conference on Industrial Informatics.